On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
1. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

Samad Rostampour; Nasour Bagheri; Mehdi Hosseinzadeh; Ahmad Khademzadeh

Volume 3, Issue 4 , Summer and Autumn 2016, Pages 201-209

Abstract
  The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the ...  Read More
Multicollision Attack on a recently proposed hash function vMDC-2
2. Multicollision Attack on a recently proposed hash function vMDC-2

Zahra Zolfaghari; Hamid Asadollahi; Nasour Bagheri

Volume 3, Issue 4 , Summer and Autumn 2016, Pages 211-215

Abstract
  In this paper, we describe an attack on a new double block length hash function which was proposed as a variant of MDC-2 and MDC-4. The vMDC-2 compression function is based on two calls ...  Read More
Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks
3. Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks

Narges Mehran; Naser Movahhedinia

Volume 3, Issue 4 , Summer and Autumn 2016, Pages 217-231

Abstract
  Named Data Networking (NDN), a data-centric enabled-cache architecture, as one of the candidates for the future Internet, has the potential to overcome many of the current Internet ...  Read More
Persian Texts Part of Speech Tagging Using Artificial Neural Networks
4. Persian Texts Part of Speech Tagging Using Artificial Neural Networks

Zahra Hosseini Pozveh; Amirhassan Monadjemi; Ali Ahmadi

Volume 3, Issue 4 , Summer and Autumn 2016, Pages 233-241

Abstract
  Part of speech tagging (POS) is a basic task in natural language processing applications such as morphological parsing, information retrieval, machine translation and question answering. ...  Read More